Search Results - (( based generation method algorithm ) OR ( using active method algorithm ))

Refine Results
  1. 1

    Hybrid firefly and particle swarm optimization algorithm for multi-objective optimal power flow with distributed generation by Khan, Abdullah

    Published 2022
    “…Therefore, the SMA method is redesigned for optimal location and sizing based on the total active power loss of the systems. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Voltage constrained optimal power flow based using genetic algorithm by Yassir Asnawi, Teuku Hasannuddin

    Published 2015
    “…Simulation results of the three-phase voltage profi le along the tested feeder using the proposed method provide better results than other mentioned methods. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    EEG-based brain source localization using visual stimuli by Jatoi, M.A., Kamel, N., Malik, A.S., Faye, I., Bornot, J.M., Begum, T.

    Published 2016
    “…Various source localization algorithms have been developed to determine the exact locations of the active brain sources due to which electromagnetic activity is generated in brain. …”
    Get full text
    Get full text
    Article
  4. 4

    Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed by Aneesa Ali, Ali Saeed

    Published 2017
    “…The results were statically analyzed using t-test to show the significance of the proposed method compared to the existing methods. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    A numerical method for frequent pattern mining by Mustapha, Norwati, Nadimi-Shahraki, Mohammad-Hossein, Mamat, Ali, Sulaiman, Md. Nasir

    Published 2009
    “…In this paper, an efficient numerical method for mining frequent patterns is proposed. This method is based on prime number characteristics to generate all frequent patterns by using maximal frequent ones. …”
    Get full text
    Get full text
    Article
  6. 6

    Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff by Mohd Yusoff, Mohd Izhan

    Published 2014
    “…The new algorithm is tested on simulated and real data where the results show it is capable of detecting fraud activities. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Optimal power flow using hybrid firefly and particle swarm optimization algorithm by Khan, Abdullah, Hizam, Hashim, Abdul Wahab, Noor Izzri, Othman, Mohammad Lutfi

    Published 2020
    “…The obtained results of the proposed algorithm are compared to simulated results of the original Particle Swarm Optimization (PSO) method and the present state-of-the-art optimization techniques. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    A new ant based rule extraction algorithm for web classification by Ku-Mahamud, Ku Ruhana, Saian, Rizauddin

    Published 2011
    “…Methods to reduce the number of attributes and discretization are two important data pre-processing steps before the data can be used for classification activity. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  9. 9

    Optimizing Decentralized Exam Timetabling with a Discrete Whale Optimization Algorithm by Emily Siew, Sing Kiang, Sze, San Nah, Goh, Say Leng

    Published 2025
    “…These methods have been rigorously tested and compared against proprietary heuristic-based software and manual methods. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Optimizing decentralized exam timetabling with a discrete whale optimization algorithm by Emily Sing Kiang Siew, San nah sze, Say leng goh

    Published 2025
    “…This problem remains an active area of research and, to the authors' knowledge, has not been adequately addressed by the WOA algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Comparison on machine learning algorithm to fast detection of malicious web pages by Wan Nurul Safawati, Wan Manan, Mohd Nizam, Mohmad Kahar, Noorlin, Mohd Ali

    Published 2021
    “…Compared to several decision tree method, Random Forest has shown promising and higher sensitivity result towards malicious data which is 98.3% compared to other classification algorithm…”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Anomaly detection in system log files using machine learning algorithms / Zahedeh Zamanian by Zahedeh, Zamanian

    Published 2019
    “…Also, log files are heterogenous and cannot fed them directly in machine learning algorithms. Furthermore, many of the companies use the signature-based detection method which is not capable of capturing more advanced attackers that use unfamiliar attacks methods. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    An evolutionary based features construction methods for data summarization approach by Rayner Alfred, Suraya Alias, Chin, Kim On

    Published 2015
    “…In other words, this research will discuss the application of genetic algorithm to optimize the feature construction process from the Coral Reefs data to generate input data for the data summarization method called Dynamic Aggregation of Relational Attributes (DARA). …”
    Get full text
    Get full text
    Research Report
  15. 15

    Algorithm As A Problem Solving Technique For Teaching And Learning Of The Malay Language by Jano, Zanariah, Omar, Norliza, Nazir, Faridah

    Published 2019
    “…As a conclusion, the student's reaction as they remain focused throughout the session shows that the use of algorithms and scratch programs is better than conventional methods in teaching the Malay Language…”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Class binarization with self-adaptive algorithm to improve human activity recognition by Zainudin, Muhammad Noorazlan Shah

    Published 2018
    “…Two publicly activity datasets are used; Wireless Sensor Data Mining (WISDM) and Physical Activity Monitoring for Aging People (PAMAP2). …”
    Get full text
    Get full text
    Thesis
  17. 17

    Determination of tree height based on tree crown using algorithm derived from UAV imagery / Suzanah Abdullah ... [et al.] by Abdullah, Suzanah, Tahar, Khairul Nizam, Abdul Rashid, Mohd Fadzil, Osoman, Muhammad Ariffin

    Published 2021
    “…The single tree crown was obtained from the digital surface model by using four algorithms such as watershed segmentation, object based image analysis, inverse watershed segmentation and seed generation. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Algorithm as a problem solving technique for teaching and learning of the Malay language by Faridah Nazir, Zanariah Jano, Norliza Omar

    Published 2019
    “…As a conclusion, the student's reaction as they remain focused throughout the session shows that the use of algorithms and scratch programs is better than conventional methods in teaching the Malay Language.…”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Hybrid genetic algorithm with multi-parents recombination for job shop scheduling problems / Ong Chung Sin by Ong, Chung Sin

    Published 2013
    “…The problem was initially tackled by “exact methods” such as the branch and bound method, which is based on the exhaustive enumeration of a restricted region of solutions containing exact optimal solutions. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Active vibration control of a flexible beam structure using chaotic fractal search algorithm by Tuan Abdul Rahman, Tuan Ahmad Zahidi, As'arry, Azizan, Abdul Jalil, Nawal Aswan

    Published 2017
    “…Based on the proposed method, about 83.95% of the initial vibration disturbance successfully been suppressed with the mean-squared error value of 1.5178 x 10-4 been achieved. …”
    Get full text
    Get full text
    Get full text
    Article